Free Essay

Peer Letter

In:

Submitted By karen99344
Words 507
Pages 3
Blanca Fuentes
English 099 2538
October 15,2015

What Does it Mean To Be an American
What does it mean to be bilingual to society? As Jake Jamieson states “ …holding to their past…”(266). Jamieson presents a well-constructed argument by presenting the two points of view; from an American and a native speaker. Jamieson mentions, how Americans feel offended when hearing a native language assuming that if a person is moving to America, then it should learn the language and adjust to their culture. Yet, Americans are forgetting that one of their constitution laws encourages freedom of speech. Then why deprive a person from exercising their right? As Maryam Marquez introduces a new point of view as a native speaker herself she states: “ Being an American has very little to do with their language we use during our free time in a free country”(528). Although Jake Jamieson presents both views, it would be fair to say that both authors agree to the importance it is to keep and respect our culture.
“ …Twenty-seven states…have made English their official language…official-English laws always seem to be linked to anti-immigration legislation, such as proposals to limit immigration or to restrict government benefits to immigrants”(Jamieson, 269). Jamieson’s argument suggests that this is not a native language problem but a cultural problem where immigrants are not wanted in America. The author Myriam Marquez in “Why and When We
Speak Spanish in public,” also presents a similar point of view by stating:

Throughout this nations history, most immigrants- whether from Poland or Finland or
Italy or wherever else-kept their language throughout the first generation and, often, the second. Latin American immigrants…have fought for this country in U.S.-led wars. (529)

This suggests once again that immigrants have participated fully on this country from voting to paying taxes, deserving to keep their culture with them. Marquez mentions that keeping her native language is a way to show respect toward her parents. As a U.S citizen coming from a
Hispanic background, I find it offensive not being able to express myself freely in public without being judge by another U.S. citizen who only speaks English. I would like to be able to honor my family’s culture without being ashamed of speaking my first language.
It is very clear Jake Jamieson and Myriam Marquez have the same perspective on cultural and language values. Jamieson starts by introducing the right of freedom of speech, while the author Marquez introduces a personal point of view. It is obvious that both authors and evidence supports native language speakers.
Work Cited
Jake Jamieson, “The English-Only Movement: Can America Proscribe Language with a Clear
Conscience?”
Models for Writers: Short Essays for Composition. Al. Rosa, and P. Eschholz
12th ed. Boston/New York: Bedford/St. Martin’s, 2015

Myriam Marquez, “Why and When We Speak Spanish in Public”
Models for Writers: Short Essays for Composition. Al. Rosa, and P. Eschholz
12th ed. Boston/New York: Bedford/St. Martin’s, 2015

Similar Documents

Premium Essay

Change of Audience-Letter to Peer

...Top of Form Bottom of Form Change of Audience-Letter to Peer Dear Peer: Students who have been in Composition I with Ms. Velcy have learned lot of things for their writing expertise. This instructor is doing very good job as a teacher. Based on the experience, the instructor offered so many useful information which is important to students to improve their writing skill for future jobs. All students were listening to the instructor attentively. The first impression about instructor is her writing skills and teaching way. The first day in this class was very good and everyone was excited to be in this class. The brief introductions of all students at class were helpful for teacher to understand their pros and cons in writing so she could get the outlines and ideas to teach everybody better. Students in this class have been having so many goals, but the most important thing is to get a better job. That is reason why we have to improve our writing skills to be impressive on their resume when applying for a job. I am her to learn more about all the pre-writing techniques. Such as free-writing/brain-storming, listing, clustering and looping. Most of these techniques I like, but my favorites is listing technique which may be easier to get started. There are some challenges that I will have. Everybody got all have their challenges of their own, It would be good to challenge one another so that we can become better writers. Learning writing is good for all of use and for our...

Words: 284 - Pages: 2

Premium Essay

Music Piracy and Its Effects on the Demand, Supply, and Prosperity of the Music Industry

...Music Piracy and its Effects on the Demand, Supply, and Prosperity of the Music Industry Abstract In an era where pop culture and technology are rapidly growing, intertwining and becoming embedded in the everyday lives of Americans, it was inevitable that their paths would cross. Possibly the most affected medium of pop culture is the music industry. The growth and development of the internet is either their biggest gift or biggest curse. Modern technology has made wide-scale trading of music possible in the form of MP3 files available over the internet for free. Users can simply upload the files to these sharing sites and millions of others at any given time have the ability to download it from them. The Recording Industry Association of America, however, doesn’t share the enthusiasm about these file sharing practices. To them, it is stealing from the record company and from the artist themselves. Consumers don’t tend to see it that way. The issue that arises here is whether or not should music be accessible for free trade over the internet. On the one hand, it is thought that MP3 downloads reduce sales of legitimate CDs. On the other hand, it can be argued that downloading free MP3s could actually encourage someone to buy a CD which they may not have purchased had they not heard it in its entirety. This is known as the sampling effect. The focus of this research paper will be to paper analyze the impact of music file sharing on the demand, supply, and prosperity...

Words: 6792 - Pages: 28

Premium Essay

Near Field Communication

...NEAR FIELD COMMUNICATION Near Field Communication is an immerging technology in the field of wireless industry. NFC technology can be used in billing counters, buses, or sharing information to friends. It can be used by swapping the smart phone over NFC enabled device such as a NFC tag which has information stored in it. For example instead of swiping credit card in the card reader at any shop we can just simply take out phone from our pocket and wave it over the NFC enabled reader and credit card information will be transferred to the bank. HISTORY OF NFC NFC is not an innovation basically but an advance version of other short range wireless technologies like RFID. NFC forum was created to define the standards of NFC and facilitate it for further growth. NFC forum was founded in year 2004 in collaboration by Sony, Nokia and Philips. It define some standards which has to be followed by the NFC enabled devices and smartphones. The forum also ensures the inter compatibility of the NFC devices, which means that any NFC device can communicate with any other NFC device which provides a simple and fast way to transfer data and therefore it doesn’t restrict users to a few devices. Currently some companies have started using NFC technology such as Google and PayPal and this will encourage users to try this new technology. NFC is focusing on United States and is ready to establish itself as simple, contactless payment system. ...

Words: 1184 - Pages: 5

Premium Essay

Piracy

...Piracy- Now a major offense PHI 300 SEC 1 EMPL ID 773958 In America, the RIAA (Recording Industry Association of America) is the trade organization that works to protect intellectual property of artists and music labels. They attempt to prevent piracy of artists’ work by in some cases prosecuting offenders. According to the RIAA, global piracy causes $12.5 billion of economic losses every year, 71060 U.S. jobs lost, a loss of $2.7 billion in workers earnings (RIAA). How exactly then do prosecutors solve this issue? Their answer is to sue for excessive amounts, and even prosecuting to where it can lead up to 5 years in prison. One prime example of this unfair justice is the fairly new case involving Jammie Thomas-Rasset, who illegally downloaded over 1700 songs from a p2p network. It is unethical for such a corporation to incarcerate or even sue for such a misdemeanor offense (Barret, 2010). The evolution of how we obtain music has become easier to the public due to programs that allow people to download single songs or even albums, preventing them from having to leave their homes. Although it may seem effortless, downloading music has some stipulations that go along with how you are receiving the files. Basically what it boils down to is, if you did not pay for it, then it is illegal and considered piracy (RIAA). Illegal actions should be dealt with, but the question is, “Should the RIAA be rewarded such unruly amounts of cash, or better yet send people to jail over...

Words: 1326 - Pages: 6

Premium Essay

Mcbride Financial Security

...McBride Financial Security Policy To bring McBride’s electronic key online will provide a great source of control in their area of physical security. Employees will only have access to areas that their work in and access to information according to their rank in McBride facility. Any unauthorized access to any area of any McBride facility will be punishable in accordance with McBride's Non-Compliance Policy. If an access card, key are lost or stolen or is not returned a fee will be charged for a new item. When an access card is lost, it will be deactivated immediately until a new card is issued. When processing a loan application, McBride is in control of large amount of sensitive customer information including the customer’s credit report and history. The protection of this information is very important. To protect data from loss, equipment failure, or intentional destruction, all mortgage applications and associated data will be backed up to magnetic tape as well as archived to a remote server daily. Magnetic tape backups will be performed every evening (except for Sunday when tape drives will be cleaned and maintained). All data backups will be perform only by an authorized member of McBride's in-house IT department. Another way that McBride will now protect sensitive data is through account access controls. Passwords, encryption, and pertinent classification of data are a few measures that will be implemented to ensure this protection. Every procedure and process...

Words: 663 - Pages: 3

Premium Essay

Richman Investments

...Richman Investments holds requirements for the usage of the company network including filtering policies for network traffic through an AUP. Acceptable use policy (AUP) would start with the User Domain. The user domain is the employee within an organization who is granted access to the information system for the organization. There are roles and tasks, responsibility, and accountability that go into an acceptable use policy for the user domain. Within the user domain, access to the LAN to WAN, web surfing, and internet could be used help gather information between customers and employees. LAN to WAN is the activities between LAN to Wan and firewalls, routers, intrusion, detection, and workstations. Web surfing determines what a user can obtain on company time with company resources. Internet, is when the user has access to the internet with the types of controls the organization has on the certain internet sites being accessed. Although LAN to WAN, web surfing, and internet have some of the same characteristics, they also have different specific IT infrastructures it affects. . For the LAN to Wan AUP, it will goes with the roles and task parts of the user domain. Users would be given access to certain systems, applications, and data depending on their access rights. The AUP is a more of a rulebook for employees to follow when using the organization’s IT assets. If the AUP is violated, it could be grounds for termination from the company. The AUP will set rules for employees...

Words: 1029 - Pages: 5

Free Essay

File Sharing: What and How Effects on Music Sales.

...are discuss common methods of storage, transmission and dispersion include manual sharing utilizing removable media, centralized servers on computer networks,World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer networking.We consider the specific case of file sharing and it’s effects on legal sales of music . 1. Introduction Files were first exchanged on removable media.Computers were able to accessremotefilesusing filesystem mounting and FTP servers.The mp3 encoding, which was standardized in 1991 and which substantially reduced the size of audio files, grew to widespread use in the late 1990s. In 1998, MP3.com and Audiogalaxy were established, The Digital Millennium Copyright Act was unanimously passed, and the first mp3 player devices were launched. In June 1999, Napster was released as an unstructured centralized peer-to-peer system, requiring a central server for indexing and peer discovery. It is generally credited as being the first peer-to-peer file sharing system. Gnutella, released in March, was the first decentralized file sharing network. In the gnutella network, all connecting software was considered equal, and therefore the network had no central point of failure. In July The popularity of peer-to-peer file sharing applications such as Gnutella andNapster...

Words: 1877 - Pages: 8

Free Essay

Influences of Emerging Technology

...industries. Countries with strong economic growth and population and a good disposable income are very accepting to the rapid uptake of technology. At the moment there is an enormous growth in information and communication fields. This has created a significant social change. (p167) Copy paragraph p168. Emerging technologies often result from an unorthodox combination of existing entities. The focus of these new technologies lies in the areas of: * Group collaboration on tasks * Next generation internet architecture that facilitates smoother communication * Real-world web services It is the norm to have multidisciplinary teams from around the globe working on one project. Collaboration tools * Podcasts * Peer to peer voice over IP * Desktop search * wikis Research of the new technologies p 170-171 Factors affecting emerging technologies and their development. They require constant finance and development. Factors that influence include: * The marketing strategies * Timing of release * Political factors * Economic boom or turndown * Cultural factors such as religious believes * Social influences and fashions * Legal factors – change of government and policy...

Words: 402 - Pages: 2

Free Essay

How Is Digital Piracy Hurting Modern Society?

...| How is Digital Piracy Hurting Modern Society? | | | Introduction Digital Piracy is a huge crime that is large hurting the entertainment business here in the United States and in other countries, but the question I ask myself is how digital piracy hurting modern society? What actions are our governments taking to stop people from downloading illegal music, movies, and software? How much of a profit loss is effecting the companies that are producing this digital material? If someone knows what the punishment is for downloading music, movies, and software would they still do it. This research will aim to understand what is digtal piracy is and why it is that people download illegal software, movies, and music. Literature review In the article Examine Digital Piracy: Self-Control, Punishment, and Self-Efficacy, the authors introduce what digital piracy is and how it changes on a constant basis. They show how the “United States government has been cooperating in the fight against digital piracy with the software, music and movie industries with the Digital Millennium Copyright Act (DCMA)” (Zhang, Smith, McDowell, 2009). They discuss how most people think that digital piracy is acceptable, it a soft crime and it does not hurt anyone, and most think that this information should be exchanged freely. The authors also did an online-survey study on college students who were taking Management Information Sciences (MIS) course at a public university in the southern United...

Words: 1689 - Pages: 7

Premium Essay

Mr Green

...has no components of the network so I will have to work from scratch. The initial set up will be two workstations and a printer. He also informs me that he will need internet access with multiple email addresses. The need for security is low so the security suite doesn’t have to be complex. Since he is just starting the business he has limited funds. He needs to keep the overall start up cost to under $5000.00 and the monthly cost to under $200.00. I told him I would do it and this is the design I gave him. First of all I need to start with the workstations themselves. Since he needs to track orders and keep an accounting data sheet I will have to have the right programs for him. We will connect the two workstations using the peer-to-peer network. This allows both computers to communicate with each other and share programs but can keep some files protected for the other computer (Dean, P3). Also with this network it is very simple and less expensive. The computers I would recommend for this would be the HP Compaq 6000 pro all in one business pc. This is an outstanding product cost $811.00 and will have great memory and storage for all his needs. This computer come with a 4 GB RAM, storage capacity of 320 GB and is loaded with Microsoft windows 7 professional. There are also up to 7 USB 2.0 ports which are great for small businesses...

Words: 1140 - Pages: 5

Premium Essay

Loyalty

...Loyalty is like a shadow it’s something that’s with you all of the time, but sometimes it’s hidden. Most people don’t show their loyalty hidden, but loyalty is something that’s not supposed to be hidden .To me loyalty is when someone is there for someone else. Loyalty is a characteristic many people should strive to have; it earns the trust and respect of many. A loyal person would never be able to fail someone because they are trustable. Loyalty is everywhere and there are many different kinds of loyalty. Loyalty to strangers is one of the many different kinds of loyalty. We have all showed loyalty to strangers at least once. When people follow rules somewhere either at school, work etc. This shows loyalty. Loyalty doesn’t only earn the respect of someone, but being loyal to a stranger show that you respect them even if you don’t know them. When we follow rules at some place it shows we are staying honest to the rules and the rule makers. Our honesty shows loyalty. Another type of loyalty is to friends. We all have friends, but there are many components to being loyal to your friends. When your friends tells you something and they expect you to keep it a secret, keeping this a secret shows loyalty. Not keeping the matter a secret will show disloyalty. Disloyalty will lose a friend’s trust and it will be really hard to regain a friend’s trust when it’s been lost. When a secret, which is supposed to be kept, gets out the friendship itself is in danger of breaking. Helping...

Words: 797 - Pages: 4

Free Essay

Net Neutrality

...One of the most aggressive and fast growing commodity in today’s world without a doubt is the internet. It’s truly amazing how we can achieve what we want with just a click of a button. A business man can gain all the market knowledge while sitting in his office, students can access thousands of documents they wish to research on unlike earlier times when they had to physically go through hundreds of books. It’s true that the internet has made a huge impact on our lives and has made us more accessible. But is this impact considered to be good or is it bad? Most people would argue it is certainly a positive impact on mankind, but just like every coin has two sides the internet also portrays both the sides. Internet is certainly a blessing in many ways but at times it can become a curse too. This concern gives birth to governance of the internet. “Internet governance is a broad term used in many different contexts, applying to activities as diverse as coordination of technical standards, operation of critical infrastructure, development, regulation, and legislation, among others” (1). Issues like child pornography, identity theft and criminal activities are just few of the major reasons for internet to be controlled. The best way to govern it would be by placing certain restrictions over it and denying access to certain web pages, but it’s not as easy as it sounds. With placing restrictions on the internet another major issue arises that of net neutrality. What is net neutrality...

Words: 977 - Pages: 4

Free Essay

Network Security

...Peer-to-Peer and Client/server Networks Professor: Karen Lederer Trevor Kale 4/16/2011 We shall discuess the difference between Peer-to-Peer networks and the Client/Server networks. First we need to describe how each one operates in order to view the differences between both. First we will describe a Peer-to-Peer network. In the Peer-to-Peer network every computer can communicate directly with every other computer.(2009, Dean, Pg.3) Because of this setup no one computer has more authority then another one on the network. Each person on the network can set their access and restrictions for other users to their computer. These configurations are simple to configure and due to the simplisity they do not require a great technical expertise. They also tend to be cheaper due to lack of need of equipment to establish this network. Some disadvantages consist of not being flexible, that is as they grow they become more difficult to handle. Security on these networks is very lacking due to ease of access of unauthorized access. They are also not very practical due to the lack of centralized resources requires a user to have their terminal on in order to access their resources. That is the basics of a Peer-to-Peer network setup, next we move on to the Client/Server model. In a Client/Server network a centralized computer known as a server facilitates communication between other computers on the network known as clients. For a computer to function as a server they must be running...

Words: 478 - Pages: 2

Free Essay

Individual: Building an Ethical Organization Part 1

...members is made-up of individuals and members with disabilities families helping families covers twelve parishes that is made-up of Region 8. I have seen family helping families help many of people in high school I would totally us the organization because children with disability are over looked and not given the same rights has others. In high school my mother fined this organization when she was trying to locate help for other classmates of mine I would never forget this ladies name her name was Lori. She was completely helpful with going beyond her call they even got in touch with the school and to give more assists to the family and the child. Their Mission and Vision was to provide information and referral, education and training and peer to peer support to all individuals living with disabilities and their families. Their Vision is to strengthen and support and empower the individuals and their families while providing home and the community inclusion. Point of information and Referral when a family is referred to the offices for Citizens with Developmental Disabilities they will determined to see their eligibility for the services and for their own they will referred to Families Helping Families then they will address any problems that need to handle. I would like to talk about three of the services Family Helping Families use one being Education & Support of those with Dual Diagnoses this program allow trouble students remain within their community and school. Personnel...

Words: 1074 - Pages: 5

Free Essay

The Benefits of Twisted Pair Cable

...is the peer to peer model. This model is an ideal selection for a company or organization when there are very few computers. Since your organization currently has 20 Windows peer to peer client computers I would like for you to consider moving towards the client server network modelOnce a peer-to-peer network grows beyond 10 computers, it will likely begin to suffer from performance and from administrative problems (Posey, 2000) In the client server network model network hosts have specific roles which are assigned to them. There are certain host that are assigned as servers, which will provide network resources to the workstations. Unlike the current peer to peer model that is supported in your organization today in which everyone workstation has the same or similar operating systems. There are several benefits for your organization to consider to transitioning to client server network model. One of the major benefits of the client server network model is scalability. Since we know the potential for this organization to double in size over the next two years scalability is a key factor. It’s very easy to expand the size of your network with client server model because it will be easy to just add on workstation. Everything is centralized to the server. This server will be the centralized platform for all the workstations. Another major benefit of this client server model is increased security. This server will provide security that Ocper, Inc. current peer to peer...

Words: 719 - Pages: 3